2014 10th International Conference on Communications (COMM) 2014
DOI: 10.1109/iccomm.2014.6866768
|View full text |Cite
|
Sign up to set email alerts
|

Chaos-based block ciphers: An overview

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…… (12) where and are the plain image and cipher image respectively. and are the width and height of the image respectively.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…… (12) where and are the plain image and cipher image respectively. and are the width and height of the image respectively.…”
Section: Resultsmentioning
confidence: 99%
“…Logistic maps are used to create round keys for the DES algorithm. The chaotic map used in Assad et al, 2014 [12] is a tent map for production of S-box and Arnold's map for permutation of pixels.…”
Section: Related Workmentioning
confidence: 99%
“…Cryptography as the art of science that is more recently considered as a branch of both computer science and mathematics [1], can be utilized as a useful scientific approach to provide image's security, confidentiality and integrity via the research of designing an efficient image encryption scheme that can make a good compromise between satisfactory level of security and execution time, these purposes can't be accomplished with the direct use of traditional encryption algorithms [2] such as DES [3], IDEA [4], AES [5] that mark their unsuitability for encrypting digital images [6] due to their intrinsic features like bulk data capacity, large data size, high redundancy and strong correlation of adjacent pixels in addition to the large computational time. In this paper, a complete study of some recent and prevalent proposed schemes in the literature are presented in detail, this study puts a focus on analyzing each work by giving its advantages and limitations in terms of security level and execution time.…”
Section: Introductionmentioning
confidence: 99%
“…Research has shown that chaos systems are extremely sensitive to the changes of control parameters and initial conditions. They have pseudo-random behavior for nonauthorized parties [Akhshani et al, 2012;El Assad et al, 2014;Kassem et al, 2014;Chiaraluce et al, 2002;Chen et al, 2004;Behnia et al, 2008;Wang et al, 2013;Chang, 2009]. Experimental results show that the chaos-based encryption algorithm can overcome security issues in efficient and adaptive ways compared to the classical encryption ones (such as DES and AES) [Abd El-Latif et al, 2012;Furht & Socek, 2003;Li et al, 2006;Bhargava et al, 2004;Mansour et al, 2012;Bhatnagar & Jonathan Wu, 2012].…”
Section: Introductionmentioning
confidence: 99%